understand ethics and security in the programming process

Post on 06-May-2015

529 Views

Category:

Education

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Understand Ethics and Security in The Programming Process

“Dealing with ethical problems aggravated, transformed or created by computer technology”

- Computer Ethics in the Computer Science Curriculum

What is Computer Ethics?

ACM – Association for Computer Machinery

Centre for Computing and Social Responsibility The Research Center on Computing & Society

Organizations

Ethical Considerations

Due to the computer’s ability to store and manipulate large amounts of information

Information Age

Do not attempt to access the account of another user without authorization

Do not share your password – change it periodically

Use appropriate subject matter and language, and be considerate of other people’s beliefs and opinions.

Netiquette

Ethical issue

Computers record transactions, calls, etc. (These records can be used to learn a lot about you.)

Because of privacy issues, many laws have been passed.

Privacy

Marketing technique where data is collected about customers visiting a website

Online Profiling

Text file created by the server computer when a user enters information into a website. (not a delicious treat)

Cookie

Tiny, transparent graphics located on web pages or in e-mail message that are used in combination with cookies to collect data about web page users or email senders

Web Beacon

Legally binding document that explains how any personal information will be used.

Privacy Policy

Information Technology Laws in the

United States

Technology Laws

• Identity Theft Penalty Enhancement Act of 2004

• Federal Information Security Management Act of 2002 (FISMA)

• Consumer Credit Reporting Reform Act of 1996

• Privacy Act of 1974

• Right to Financial Privacy Act of 1978

• Electronic Communications Privacy Act of 1986 (ECPA)

• Electronic Freedom of Information Act of 1996

• Children’s Online Privacy Protection Act of 1988 (COPPA)

• Safety and Freedom through Encryption Act of 1999 (SAFE)

• Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001

Implications of Computer Use

The science that studies safe work environments.

Repetitive stress injuries, eye strain, etc.

Ergonomics

Power & paper waste

Disposal of outdated hardware

Environmental Concerns

Issues with computers in the workplace

Employee Monitoring

Identity theft

Invasion of Privacy

Protection of SOFTWARE

& DATA

Protection of digital information

NET (No Electronic Theft) Act of 1997

• Protects against copyright infringement

Copyright

Illegal copies being distributed.

Piracy

Program or series of instruction that can replicate without the user’s knowledge

Trojan Horse » Appears as something else

Worm » Program that is able to reproduce itself over a network

Virus

Install on computers to detect and remove code before it can replicated or damage data

Antivirus-Programs

Update virus software

Do not open email attachments without scanning.

Precautions to Take

Illegal act to gain access to large computer systems to perform acts of vandalism.

Electronic Communications Privacy Act of 1986 makes it a federal offense.

Most networks have a firewall to prevent this type of access.

Crackers, Hackers

Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft.

Phishing

top related